default search action
Ji-Jian Chin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Terry Shue Chien Lau, Zhe Sun, Sook-Chin Yip, Ji-Jian Chin, Choo-Yee Ting:
On the Security and Design of Cryptosystems Using Gabidulin-Kronecker Product Codes. CoRR abs/2410.06849 (2024) - 2023
- [j19]Terry Shue Chien Lau, Fedor Ivanov, Muhammad Rezal Kamel Ariffin, Ji-Jian Chin, Timothy Tzen Vun Yap:
New code-based cryptosystems via the IKKR framework. J. Inf. Secur. Appl. 76: 103530 (2023) - 2022
- [j18]Yun-Xing Kho, Swee-Huay Heng, Ji-Jian Chin:
A Review of Cryptographic Electronic Voting. Symmetry 14(5): 858 (2022) - 2021
- [j17]Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh:
Simple and scalable blockchain with privacy. J. Inf. Secur. Appl. 58: 102700 (2021) - [j16]An Braeken, Ji-Jian Chin, Syh-Yuan Tan:
ECQV-IBI: Identity-based identification with implicit certification. J. Inf. Secur. Appl. 63: 103027 (2021) - [j15]Jason Chia, Ji-Jian Chin, Sook-Chin Yip:
A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures. Symmetry 13(8): 1330 (2021) - [j14]Jason Chia, Swee-Huay Heng, Ji-Jian Chin, Syh-Yuan Tan, Wei-Chuen Yau:
An Implementation Suite for a Hybrid Public Key Infrastructure. Symmetry 13(8): 1535 (2021) - [j13]Chong-Gee Koa, Swee-Huay Heng, Ji-Jian Chin:
ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism. Symmetry 13(9): 1640 (2021) - [c21]Jason Chia, Ji-Jian Chin, Sook-Chin Yip:
Pluggable Authentication Module Meets Identity-Based Identification. ACeS 2021: 155-175 - [c20]Jason Chia, Ji-Jian Chin, Sook-Chin Yip:
OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss. ProvSec 2021: 116-135 - [i2]Jason Chia, Ji-Jian Chin, Sook-Chin Yip:
Digital signature schemes with strong existential unforgeability. F1000Research 10: 931 (2021) - [i1]Sook-Yan Hue, Jason Chia, Ji-Jian Chin:
Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings. IACR Cryptol. ePrint Arch. 2021: 414 (2021) - 2020
- [j12]Jason Chia, Ji-Jian Chin:
An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries. IEEE Access 8: 61711-61725 (2020) - [c19]Jason Chia, Ji-Jian Chin, Sook-Chin Yip:
Evaluating Pairing-Free Identity-Based Identification Using Curve25519. ACeS 2020: 179-193 - [c18]Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh:
Evolution of Bitcoin Addresses from Security Perspectives. ICITST 2020: 1-6 - [c17]Sook-Yan Hue, Nor Haniza Sarmin, Eddie Shahril Ismail, Ji-Jian Chin:
Easy Simple Factoring-based Digital Signature Scheme. ICITST 2020: 1-4 - [c16]Raadhesh Kannan, Ji-Jian Chin, Xiaoning Guo:
Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API. ICITST 2020: 1-4 - [c15]Moesfa Soeheila Mohamad, Ji-Jian Chin:
Improved Indistinguishability for Searchable Symmetric Encryption. ProvSec 2020: 190-212
2010 – 2019
- 2019
- [c14]Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh:
Proof of Bid as Alternative to Proof of Work. ACeS 2019: 60-73 - [c13]Ji-Jian Chin, Yvonne Hwei-Syn Kam, Vik Tor Goh:
Vulnerabilities in Online Food Ordering Website. ACeS 2019: 350-357 - [c12]Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin:
Improving Signature Schemes with Tight Security Reductions. ISPEC 2019: 273-292 - 2018
- [j11]Geong Sen Poh, Moesfa Soeheila Mohamad, Ji-Jian Chin:
Searchable symmetric encryption over multiple servers. Cryptogr. Commun. 10(1): 139-158 (2018) - 2017
- [j10]Geong Sen Poh, Vishnu Monn Baskaran, Ji-Jian Chin, Moesfa Soeheila Mohamad, Kay Win Lee, Dharmadharshni Maniam, Muhammad Reza Z'aba:
Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage. Algorithms 10(2): 52 (2017) - [j9]Geong Sen Poh, Ji-Jian Chin, Wei-Chuen Yau, Kim-Kwang Raymond Choo, Moesfa Soeheila Mohamad:
Searchable Symmetric Encryption: Designs and Challenges. ACM Comput. Surv. 50(3): 40:1-40:37 (2017) - [j8]Thong-Yun Teh, Yik-Shu Lee, Zi-Yik Cheah, Ji-Jian Chin:
IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices. Wirel. Pers. Commun. 94(1): 127-144 (2017) - [c11]Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin:
A variant of Schnorr signature scheme with tight security reduction. ICTC 2017: 411-415 - [c10]Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin:
A Variant of BLS Signature Scheme with Tight Security Reduction. MONAMI 2017: 150-163 - 2016
- [j7]Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan:
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. Cryptogr. Commun. 8(4): 579-591 (2016) - [c9]Moesfa Soeheila Mohamad, Ji-Jian Chin, Geong Sen Poh:
On the security advantages of block-based multiserver searchable symmetric encryption. PST 2016: 349-352 - 2015
- [j6]Md. Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C.-W. Phan, Geong Sen Poh, Syh-Yuan Tan, Wun-She Yap:
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum. centric Comput. Inf. Sci. 5: 19 (2015) - [j5]Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan, Rouzbeh Behnia:
A provable secure pairing-free certificateless identification scheme. Int. J. Comput. Math. 92(8): 1520-1535 (2015) - [j4]Ji-Jian Chin, Rouzbeh Behnia, Swee-Huay Heng, Raphael C.-W. Phan:
Cryptanalysis of a certificateless identification scheme. Secur. Commun. Networks 8(2): 122-125 (2015) - [c8]Syh-Yuan Tan, Ji-Jian Chin, Geong Sen Poh, Yvonne H. S. Kam, Wei-Chuen Yau:
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications. ICITCS 2015: 1-5 - [c7]Thong-Yun Teh, Yik-Shu Lee, Zi-Yik Cheah, Ji-Jian Chin:
A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices. ICITCS 2015: 1-5 - [c6]Zi-Yik Cheah, Yik-Shu Lee, Thong-Yun The, Ji-Jian Chin:
Simulation of a pairing-based identity-based identification scheme in IOS. ICSIPA 2015: 298-303 - [c5]Ji-Jian Chin, Hiroaki Anada, Syh-Yuan Tan:
Reset-Secure Identity-Based Identification Schemes Without Pairings. ProvSec 2015: 227-246 - 2014
- [j3]Ji-Jian Chin, Swee-Huay Heng, Raphael C.-W. Phan:
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model. KSII Trans. Internet Inf. Syst. 8(7): 2532-2553 (2014) - 2013
- [j2]Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan:
On the security of a modified Beth identity-based identification scheme. Inf. Process. Lett. 113(14-16): 580-583 (2013) - [j1]Syh-Yuan Tan, Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model. KSII Trans. Internet Inf. Syst. 7(4): 910-922 (2013) - [c4]Ji-Jian Chin, Rouzbeh Behnia, Swee-Huay Heng, Raphael Chung-Wei Phan:
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme. AsiaJCIS 2013: 27-32 - [c3]Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng:
An Efficient and Provably Secure Certificateless Identification Scheme. SECRYPT 2013: 371-378
2000 – 2009
- 2009
- [c2]Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
Hierarchical Identity-Based Identification Schemes. FGIT-SecTech 2009: 93-99 - 2008
- [c1]Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. EuroPKI 2008: 60-73
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint